iTWire TV 705x108notfunny

Thursday, 07 April 2022 11:42

Why good communication is vital for effective cybersecurity

By Julian Critchlow, ANZ general manager at Extreme Networks
Extreme Networks ANZ general manager Julian Crichlow Extreme Networks ANZ general manager Julian Crichlow

GUEST OPINION: When senior business leaders think about cybersecurity, it's likely they are focused on the technical measures in place within their organisation that provide effective protection.

SonicWall CTR2022 MREC

These measures need to defend everything from users and client devices to networks, on-premise infrastructure, and cloud resources. Having them deployed and constantly managed is critical.

What is equally important, however, is the way in which security risks and events are communicated within the business. Clear channels must be in place both between IT teams and C-level executives, as well as between those executives and the management board.

This communication must not be left to chance. It needs to be structured and undertaken on a regular basis. This ensures transparency and that senior mangers always know the current state of play when it comes to IT security.

Communication also needs to be a two-way process. In addition to staff reporting up the line, the board and senior managers must also regularly communicate across the business about their decisions and actions. All staff need to understand why strategies are being adopted and what this will mean for their roles.

Many businesses also find it valuable to have an audit committee charged with ongoing monitoring of cybersecurity measures and potential issues. This can help to ensure that nothing falls through the cracks and levels of risk remain acceptable.

The importance of education

As well as regular two-way communication, it's also important for senior managers and board members to gain a thorough understanding of what can be a very technical subject.

Time needs to be allocated for education and training so that these managers can be briefed on particular threats, their implications, and what the impact would be if an attack against the business was successful.

It's also critical to provide education around the security tools, services, and processes that have been selected and deployed. Senior mangers need to understand why these investments have been made, what levels of protection they deliver, and what further spending might be required in the future.

The role of the CIO

When it comes to risk assessment and mitigation, there is an important role carried out by an organisation's chief information officer (CIO).

The CIO is most often charged with assessing cybersecurity risks and determining which need action and which can be tolerated. Each category of risk can then be explained to other senior managers and to the board.

Of all the risks likely to be faced, the most serious are those likely to have an impact on customers. This could be a direct impact, such as a breach of sensitive data, or indirect such as a disruption to production that will lead to order delays.

The CIO must also consider whether a security incident has resulted in a breach of any regulatory requirements. Penalties for such breaches can be high and can lead to reputational damage.

CIOs can also help increase a business' cybersecurity readiness by providing educational sessions for board members. These regular sessions can focus on particular threats and the preventative steps that are required, or more broadly address general IT security trends.

Budgeting for risk mitigation

Part of the ongoing cybersecurity communication process will naturally involve discussions around budgeting. It's impossible for any IT infrastructure to be 100% protected from threats, so investments must be weighed against the business benefits that will be delivered.

Many businesses rely on third-party assessments to help them assess how much funding should be allocated. This can be useful as it provides an independent view of what is required and what budget allocation makes sense.

 

By developing and maintaining strong internal communication channels and ensuring all parties are aware of cybersecurity issues, a business can be well prepared to withstand attacks and quickly recover should one occur. The threat landscape is constantly changing, so these measures and approaches have never been more important.

Read 1883 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




EXL AI IN ACTION VIRTUAL EVENT 20 MARCH 2025

Industry leaders are looking to transform their businesses and achieve measurable outcomes with AI.

As organisations across APAC navigate the complexities of AI adoption, this must-attend event brings together industry leaders, real-world demonstrations, and visionary panel discussions to bridge the gap between proof-of-concepts and enterprise-wide AI implementation.

Learn how to overcome common challenges in deploying AI at scale.​

Unlock cost savings, efficiency, and better customer experiences with AI.

Discover how industry expertise and data intelligence enable practical AI deployment.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

WEBINARS & EVENTS

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments